000 01307 a2200253 4500
003 Nust
005 20170207171641.0
010 _a 2012014889
020 _a0132564718 (hardcover : alk. paper)
020 _a9780132564717 (hardcover : alk. paper)
035 _a(OCoLC)ocn772107819
040 _cNust
082 0 0 _a363.25968,DAV
100 1 _aDavidoff, Sherri.
245 1 0 _aNetwork forensics :
_btracking hackers through cyberspace
_cSherri Davidoff, Jonathan Ham.
260 _aUpper Saddle River, NJ :
_bPrentice Hall,
_cc2012.
300 _axxvii, 545 p. :
_bill. ;
_c24 cm.
505 _aPart I: Foundation (Page-1) Practical Investigative Strategies (Page-3) Evidence Acquisition (Page-45) Part II: Traffic Analysis (Page-73) Packet Analysis Page-75) Network Forensics Unplugged (Page-199) Network Intrusion Detection and Analysis (Page-257) Part III: Network Devices and Servers (Page-289) Event Log Aggregation, Correlation, and Analysis (Page-291) Switches, Routers, and Firewalls (Page-335) Web Proxies (Page-369) Part IV: Advanced Topics (Page-421) Network Tunneling (Page-423) Malware Forensics (Page-461)
650 0 _aComputer crimes
_xInvestigation
650 0 _aComputer crimes
_xInvestigation.
650 0 _aForensic sciences.
650 0 _aHackers.
700 1 _aHam, Jonathan.
942 _2ddc
_cBK
999 _c218172
_d218172